108,592 research outputs found
The Media in the Network Society: Browsing, News, Filters and Citizenship
560 p. : ill. ; 23 cm.Libro ElectrĂłnicoIn the Network Society the development of a new communicational model has been taking shape. A communicational model characterized by the fusion of interpersonal communication and mass communication, connecting audiences
and broadcasters under a hypertextual matrix linking several media devices. The Networked Communication model is the informational societies communication model. A model that must be understood also in its needed literacies for building our media diets, media matrixes and on how itâs changing the way autonomy is managed and citizenship exercised in the Information Age. In this book Gustavo Cardoso develops an analysis that, focusing on the last decade, takes us from Europe to North America and from South America to Asia, combining under the framework of the Network Society a broad range of scientific perspectives from Media Studies to Political Science and Social
Movements theory to Sociology of Communication.Index of Figures
Index of Tables
Preface
Acknowledgements
The Media in the Network Society. Contextualizing the Media in the Network Society; Media, Autonomy and Citizenship
1. The Multiple Dimensions of the Network Society. The Network Society; The Culture of the Informational Societies
2. Societies in Transition to the Network Society. Societies in Transition in the Global Network; Societies in Transitions, Values and Social Well-Being; Media and Social Change in the Network Societies
3. From Mass to Networked Communication: Communicational Models and the Informational Society Communicational Models and the Informational Society. Communicational Globalization in the 20th Century; Mass Media and New Media: the Articulation of a New Communicational Model?; Rhetoric, Accessibility of Information and Narratives Networked Communication
4. A Constellation of Networks: Mass Media, Games, Internet and Telephones. An Entertainment Meta-System in Transition: from Multimedia Games to Television; The New Entertainment Player: Multimedia Games; The Reaffirmation of TV as a Central Element of the Entertainment Meta-System; From Interactive Television to Networked Television
5. Has the Internet Really Changed the Mass Media?. From the End of Journalism to Its Reconstruction; The Information Meta-System and Its Network Organization; Television: the New Online Functions; From Radio Interactivity to Newspaper; Time Management: the Media Network
6. The Massification of the Internet Experience. The New Frontiers and Their Entry Portals; Media, Memory and Filters
7. Media and Citizenship in the Network Society. Mediation of Citizenship and Informational Literacy; The Different Media Ages; Different Media Ages, Different Forms of Citizenship?
8. Mediated Politics: Citizens and Political Parties in Continuous Democracy; An Institutional and Parliamentary; Framework for Continuous Democracy; The Internet as Hostage of Institutional Informational Politics?
9. Media, Mobilization and Protests. Goku vs. The Ministry of Culture: TerrĂ vista, Television and Newspapers; The Closure of RTP2: Television Seen from the Internet; The Pro-East Timor Movement: Human Rights, Mass Media and the Internet; Instrumentalization of the Networked Symbolic Mediation
Conclusion: Browsing, News, Filters and Citizenship.Browsing, News, Filters and Citizenship
Bibliograph
Intrusion Detection in Critical SD-IoT Ecosystem
The Internet of Things (IoT) connects physical objects with intelligent decision-making support to exchange information and enable various critical applications. The IoT enables billions of devices to connect to the Internet, thereby collecting and exchanging real-time data for intelligent services. The complexity of IoT management makes it difficult to deploy and manage services dynamically. Thus, in recent times, Software Defined Network (SDN) has been widely adopted in IoT service management to provide dynamic and adaptive capabilities to the traditional IoT ecosystem. This has resulted in the evolution of a new paradigm known as Software-defined IoT (SD-IoT). Although there are several benefits of SD-IoT, it also opens new frontiers for attackers to introduce attacks and intrusions. Specifically, it becomes challenging working in a critical IoT environment where any delay or disruption caused by an intruder can be life-threatening or can cause significant destruction. However, given the flexibility of SDN, it is easier to deploy different intrusion detection systems that can detect attacks or anomalies promptly. Thus, in this paper, we have deployed a hybrid architecture that allows monitoring, analysis, and detection of attacks and anomalies in the SD-IoT ecosystem. In this work, we have considered three scenarios, a) denial of services, b) distributed denial of service, and c) packet fragmentation. The work is validated using simulated experiments performed using SNORT deployed on the Mininet platform for three scenarios
Biobank quality management in the BBMRI.be network
From as early as 2005, different guidelines and quality standards covering biobank activities and sample handling methods have been developed to improve and guarantee the reproducibility of biomarker research. Ten years on, the BBMRI.be Quality working group wanted to gauge the current situation of these aspects in the biobanks of the BBMRI.be network. To this end, two online surveys were launched (fall 2017 and fall 2018) to the biobank quality managers in the BBMRI.be network to determine the status and setup of their current quality management system (QMS) and how their QMS and related practices have evolved over a 14 month time period. All biobanks addressed by the two surveys provided a complete response (12 and 13, respectively). A QMS was implemented in 85% of biobanks, with 4 standards emerging as primary basis. Supplementary guidelines were used, with a strong preference for the ISBER best practices for biobanks. The Standard Preanalytical Code-an indicator of the preanalytical lifecycle of a biospecimen impacting the downstream analysis results-was already implemented in 50% of the biobanks while the other half intends future implementation. To assess and maintain the quality of their QMS, 62% of biobanks used self-assessment tools and 71% participated in proficiency testing schemes. The majority of biobanks had implemented procedures for general and biobank specific activities. However, policies regarding the business and sustainability aspect of biobank were only implemented in a limited number of biobanks. A clear desire for a peer-review audit was expressed by 69% of biobanks, with over half of them intending to implement the recently published biobank standard ISO20387. Overall, the biobanks of the BBMRI.be network have actively implemented a solid quality approach in their practices. The implementation of ISO 20387 may bring further professionalization of activities. Based on the needs expressed in this survey, the Quality working group will be setting up an audit program for the BBMRI.be biobanks, to enhance, harmonize and streamline their activities. On the whole, the biobanks in the BBMRI.be network are able to substantially contribute to translational research, as a primary facilitator guaranteeing high quality standards and reproducibility
A Monitoring Network for Spectrum Governance
Dynamic Spectrum Access (DSA) is an exciting new technology, which has introduced a paradigm shift in spectrum access. As a result it also changes the role of the regulator. On one hand the scarce radio spectrum should be used in an optimal way, so that society is best served. On the other hand interference between users and between networks should be avoided. For that reason rules have to be defined for spectrum use. This topic is called spectrum governance. For evaluation and to check whether devices obey the rules, a monitoring system is needed. In this paper, we propose to use a fleet of mobile monitoring vehicles for this purpose.\u
Recommended from our members
Classification of information systems research revisited: A keyword analysis approach
A number of studies have previously been conducted on keyword analysis in order to provide a comprehensive scheme to classify information systems (IS) research. However, these studies appeared prior to 1994, and IS research has clearly developed substantially since then with the emergence of areas such as electronic commerce, electronic government, electronic health and numerous others. Furthermore, the majority of European IS outlets - such as the European Journal of Information Systems and Information Systems Journal - were founded in the early 1990s, and keywords from these journals were not included in any previous work. Given that a number of studies have raised the issue of differences in European and North American IS research topics and approaches, it is arguable that any such analysis must consider sources from both locations to provide a representative and balanced view of IS classification. Moreover, it has also been argued that there is a need for further work in order to create a comprehensive keyword classification scheme reflecting the current state of the art. Consequently, the aim of this paper is to present the results of a keyword analysis utilizing keywords appearing in major peer-reviewed IS publications after the year 1990 through to 2007. This aim is realized by means of the two following objectives: (1) collect all keywords appearing in 24 peer reviewed IS journals after 1990; and (2) identify keywords not included in the previous IS keyword classification scheme. This paper also describes further research required in order to place new keywords in appropriate IS research categories. The paper makes an incremental contribution toward a contemporary means of classifying IS research. This work is important and useful for researchers in understanding the area and evolution of the IS field and also has implications for improving information search and retrieval activities
Building Programmable Wireless Networks: An Architectural Survey
In recent times, there have been a lot of efforts for improving the ossified
Internet architecture in a bid to sustain unstinted growth and innovation. A
major reason for the perceived architectural ossification is the lack of
ability to program the network as a system. This situation has resulted partly
from historical decisions in the original Internet design which emphasized
decentralized network operations through co-located data and control planes on
each network device. The situation for wireless networks is no different
resulting in a lot of complexity and a plethora of largely incompatible
wireless technologies. The emergence of "programmable wireless networks", that
allow greater flexibility, ease of management and configurability, is a step in
the right direction to overcome the aforementioned shortcomings of the wireless
networks. In this paper, we provide a broad overview of the architectures
proposed in literature for building programmable wireless networks focusing
primarily on three popular techniques, i.e., software defined networks,
cognitive radio networks, and virtualized networks. This survey is a
self-contained tutorial on these techniques and its applications. We also
discuss the opportunities and challenges in building next-generation
programmable wireless networks and identify open research issues and future
research directions.Comment: 19 page
Enabling scalability by partitioning virtual environments using frontier sets
We present a class of partitioning scheme that we have called frontier sets. Frontier sets build on the notion of a potentially visible set (PVS). In a PVS, a world is subdivided into cells and for each cell all the other cells that can be seen are computed. In contrast, a frontier set considers pairs of cells, A and B. For each pair, it lists two sets of cells (two frontiers), FAB and FBA. By definition, from no cell in FAB is any cell in FBA visible and vice versa.
Our initial use of frontier sets has been to enable scalability in distributed networking. This is possible because, for example, if at time t0 Player1 is in cell A and Player2 is in cell B, as long as they stay in their respective frontiers, they do not need to send update information to each other.
In this paper we describe two strategies for building frontier sets. Both strategies are dynamic and compute frontiers only as necessary at runtime. The first is distance-based frontiers. This strategy requires precomputation of an enhanced potentially visible set. The second is greedy frontiers. This strategy is more expensive to compute at runtime, however it leads to larger and thus more efficient frontiers.
Network simulations using code based on the Quake II engine show that frontiers have significant promise and may allow a new class of scalable peer-to-peer game infrastructures to emerge
Rate Optimal design of a Wireless Backhaul Network using TV White Space
The penetration of wireless broadband services in remote areas has primarily
been limited due to the lack of economic incentives that service providers
encounter in sparsely populated areas. Besides, wireless backhaul links like
satellite and microwave are either expensive or require strict line of sight
communication making them unattractive. TV white space channels with their
desirable radio propagation characteristics can provide an excellent
alternative for engineering backhaul networks in areas that lack abundant
infrastructure. Specifically, TV white space channels can provide "free
wireless backhaul pipes" to transport aggregated traffic from broadband sources
to fiber access points. In this paper, we investigate the feasibility of
multi-hop wireless backhaul in the available white space channels by using
noncontiguous Orthogonal Frequency Division Multiple Access (NC-OFDMA)
transmissions between fixed backhaul towers. Specifically, we consider joint
power control, scheduling and routing strategies to maximize the minimum rate
across broadband towers in the network. Depending on the population density and
traffic demands of the location under consideration, we discuss the suitable
choice of cell size for the backhaul network. Using the example of available TV
white space channels in Wichita, Kansas (a small city located in central USA),
we provide illustrative numerical examples for designing such wireless backhaul
network
- âŠ